Analysis

  • max time kernel
    138s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 09:24

General

  • Target

    PHOTO-DEVOCHKA.exe

  • Size

    149KB

  • MD5

    e9fd8bdc0bde7fcfe125365a38eea21b

  • SHA1

    ef854a798f094d378dbcbb8fc9c6875dc6b9390b

  • SHA256

    bcf7de87a7e8e1febba170298c2584377879146cb8f89d36f152c7ff96246f5f

  • SHA512

    32f4993b48436d6ee6d5c0f427fe83bbca5df270804450326a74e518fa7f0b88b22a4ff06c32cf94bb1fa70709ded787a87ce10f6cef9f1a82c858427ba017a4

  • SSDEEP

    3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiHoaPXWH8:AbXE9OiTGfhEClq9aaPWH8

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PHOTO-DEVOCHKA.exe
    "C:\Users\Admin\AppData\Local\Temp\PHOTO-DEVOCHKA.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3916
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Company\NewProduct\all2.vbs"
      2⤵
      • Drops file in Drivers directory
      PID:1692
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Company\NewProduct\koollapsa.bat" "
      2⤵
      • Drops file in Drivers directory
      • Checks computer location settings
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:216
  • C:\Windows\SysWOW64\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Company\NewProduct\al99999.vbs"
    1⤵
    • Blocklisted process makes network request
    PID:4988

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Company\NewProduct\al99999.vbs

          Filesize

          258B

          MD5

          4f13c561e8c1a666e912afefd7cf758d

          SHA1

          9cfd5e512bbc2be7ed670f85a731d97a83c71077

          SHA256

          ebb4b61362f29913fab27388fbd70963155333eee1cb4e94110730c82d4eab40

          SHA512

          e7395661df1e81db2575900162112020dd5b6e82debb1e9c419c4399bab92d1ddbb50d0f33f9df54716c7c9398e86013cdfac82f4c2ed0e7e756f068679f3d54

        • C:\Program Files (x86)\Company\NewProduct\all2.vbs

          Filesize

          703B

          MD5

          2d6ea08436f0586e48170422bab7c38a

          SHA1

          37c85b8e2fa65881ee79703fc24ef6116d0e9ad1

          SHA256

          a119e8db9020bc3e9a540dae375bfb2ab3b136714544d6d765f7dc9c31448dce

          SHA512

          e00428d180204fc258c137fcb8b65226ed3eda7f3f488f8194a1b58f0babc2b9e0d694492e376f819eaca70c79f09925ee86f26307e32f10924693e4bab33a01

        • C:\Program Files (x86)\Company\NewProduct\hhhh.txt

          Filesize

          27B

          MD5

          213c0742081a9007c9093a01760f9f8c

          SHA1

          df53bb518c732df777b5ce19fc7c02dcb2f9d81b

          SHA256

          9681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69

          SHA512

          55182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9

        • C:\Program Files (x86)\Company\NewProduct\koollapsa.bat

          Filesize

          2KB

          MD5

          72aa207e9713c3869aab3ee8d4d16813

          SHA1

          6276deeebee93166a2f075ead56cb8532a378d7e

          SHA256

          474a48dcca705150ee9342fc8a076f4ec684d1e50240f5b0c7823500e622240f

          SHA512

          e2697f2effd036a7c24f57c957118b98eb6797be356ee34739e655ed0dfe4d637fc68e288e8c146f2f03af3adfda50d8a57ae44666fa5fe8034d3b3e3c064192

        • C:\Program Files (x86)\Company\NewProduct\slonik.po

          Filesize

          55B

          MD5

          eebc9086a079af7f6d895c462a250982

          SHA1

          413f00b078361100962d5b048eee0f3c86c27fcd

          SHA256

          761b89d1fd5256fb7bf7fd12ad675776de419ad419c1e5e211ad4784eff80d44

          SHA512

          bfa9e27ea406a7f101badb7e65fb9ffa2ead70d8ef217206184c49385160f7536ae745b66e00e3ee4f549876b689c787c8857614e93b6e096c5ef25d4e68e801

        • C:\Windows\System32\drivers\etc\hosts

          Filesize

          1KB

          MD5

          d9a93296f8c62ab96271667c72d7a3b3

          SHA1

          abcf5a6ed773cfc978fc2176138778ad406c188a

          SHA256

          f6c84e7c7fced4ae3ee3ca143fd5e134a183eb1e2f67ab71a6e9a902596be993

          SHA512

          f91de9fbc57397c895aa1bda0ed18601711b1da377ceeee9d5a5ff48a4a3ba2e4feaacf3c64475c07daf584d6374e79d8206a49d1e25bc3044b2e4b6c7d4bd02

        • memory/3916-57-0x0000000000400000-0x0000000000422000-memory.dmp

          Filesize

          136KB